Lucene search

K
cvelistCiscoCVELIST:CVE-2024-20324
HistoryMar 27, 2024 - 4:55 p.m.

CVE-2024-20324

2024-03-2716:55:53
cisco
www.cve.org
cisco
ios xe
software
vulnerability
local attacker
access
wlan
configuration
passwords
privilege checks
exploitation

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

0.0004 Low

EPSS

Percentile

9.1%

A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, low-privileged, local attacker to access WLAN configuration details including passwords.

This vulnerability is due to improper privilege checks. An attacker could exploit this vulnerability by using the show and show tech wireless CLI commands to access configuration details, including passwords. A successful exploit could allow the attacker to access configuration details that they are not authorized to access.

CNA Affected

[
  {
    "vendor": "Cisco",
    "product": "Cisco IOS XE Software",
    "versions": [
      {
        "version": "16.10.1",
        "status": "affected"
      },
      {
        "version": "16.10.1s",
        "status": "affected"
      },
      {
        "version": "16.10.1e",
        "status": "affected"
      },
      {
        "version": "16.11.1",
        "status": "affected"
      },
      {
        "version": "16.11.1a",
        "status": "affected"
      },
      {
        "version": "16.11.1b",
        "status": "affected"
      },
      {
        "version": "16.11.2",
        "status": "affected"
      },
      {
        "version": "16.12.1",
        "status": "affected"
      },
      {
        "version": "16.12.1s",
        "status": "affected"
      },
      {
        "version": "16.12.3",
        "status": "affected"
      },
      {
        "version": "16.12.8",
        "status": "affected"
      },
      {
        "version": "16.12.2s",
        "status": "affected"
      },
      {
        "version": "16.12.1t",
        "status": "affected"
      },
      {
        "version": "16.12.4",
        "status": "affected"
      },
      {
        "version": "16.12.3s",
        "status": "affected"
      },
      {
        "version": "16.12.4a",
        "status": "affected"
      },
      {
        "version": "16.12.5",
        "status": "affected"
      },
      {
        "version": "16.12.6",
        "status": "affected"
      },
      {
        "version": "16.12.6a",
        "status": "affected"
      },
      {
        "version": "16.12.7",
        "status": "affected"
      },
      {
        "version": "17.1.1",
        "status": "affected"
      },
      {
        "version": "17.1.1s",
        "status": "affected"
      },
      {
        "version": "17.1.1t",
        "status": "affected"
      },
      {
        "version": "17.1.3",
        "status": "affected"
      },
      {
        "version": "17.2.1",
        "status": "affected"
      },
      {
        "version": "17.2.1a",
        "status": "affected"
      },
      {
        "version": "17.3.1",
        "status": "affected"
      },
      {
        "version": "17.3.2",
        "status": "affected"
      },
      {
        "version": "17.3.3",
        "status": "affected"
      },
      {
        "version": "17.3.2a",
        "status": "affected"
      },
      {
        "version": "17.3.4",
        "status": "affected"
      },
      {
        "version": "17.3.5",
        "status": "affected"
      },
      {
        "version": "17.3.6",
        "status": "affected"
      },
      {
        "version": "17.3.4c",
        "status": "affected"
      },
      {
        "version": "17.3.5a",
        "status": "affected"
      },
      {
        "version": "17.3.5b",
        "status": "affected"
      },
      {
        "version": "17.3.7",
        "status": "affected"
      },
      {
        "version": "17.3.8",
        "status": "affected"
      },
      {
        "version": "17.3.8a",
        "status": "affected"
      },
      {
        "version": "17.4.1",
        "status": "affected"
      },
      {
        "version": "17.5.1",
        "status": "affected"
      },
      {
        "version": "17.6.1",
        "status": "affected"
      },
      {
        "version": "17.6.2",
        "status": "affected"
      },
      {
        "version": "17.6.3",
        "status": "affected"
      },
      {
        "version": "17.6.4",
        "status": "affected"
      },
      {
        "version": "17.6.5",
        "status": "affected"
      },
      {
        "version": "17.6.6",
        "status": "affected"
      },
      {
        "version": "17.6.6a",
        "status": "affected"
      },
      {
        "version": "17.6.5a",
        "status": "affected"
      },
      {
        "version": "17.7.1",
        "status": "affected"
      },
      {
        "version": "17.10.1",
        "status": "affected"
      },
      {
        "version": "17.10.1a",
        "status": "affected"
      },
      {
        "version": "17.8.1",
        "status": "affected"
      },
      {
        "version": "17.9.1",
        "status": "affected"
      },
      {
        "version": "17.9.2",
        "status": "affected"
      },
      {
        "version": "17.9.3",
        "status": "affected"
      },
      {
        "version": "17.9.4",
        "status": "affected"
      },
      {
        "version": "17.9.4a",
        "status": "affected"
      },
      {
        "version": "17.11.1",
        "status": "affected"
      },
      {
        "version": "17.12.1",
        "status": "affected"
      }
    ]
  }
]

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

0.0004 Low

EPSS

Percentile

9.1%

Related for CVELIST:CVE-2024-20324